• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fbi charges 6, seizes 48 domains linked to ddos for hire service

FBI Charges 6, Seizes 48 Domains Linked to DDoS-for-Hire Service Platforms

You are here: Home / General Cyber Security News / FBI Charges 6, Seizes 48 Domains Linked to DDoS-for-Hire Service Platforms
December 15, 2022

The U.S. Department of Justice (DoJ) on Wednesday introduced the seizure of 48 domains that available products and services to conduct dispersed denial-of-services (DDoS) attacks on behalf of other danger actors, efficiently lowering the barrier to entry for malicious exercise.

It also billed 6 suspects – Jeremiah Sam Evans Miller (23), Angel Manuel Colon Jr. (37), Shamar Shattock (19), Cory Anthony Palmer (22), John M. Dobbs (32), and Joshua Laing (32) – for their alleged possession in the procedure.

The internet sites “authorized paying buyers to launch highly effective dispersed denial-of-service, or DDoS, attacks that flood specific pcs with information and facts and reduce them from becoming ready to accessibility the internet,” the DoJ mentioned in a push statement.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

The 6 defendants have been billed with different jogging booter (or stresser) providers, including RoyalStresser[.]com, SecurityTeam[.]io, Astrostress[.]com, Booter[.]sx, IPStresser[.]com, and TrueSecurityServices[.]io. They have also been accused of violating the computer system fraud and abuse act.

These internet websites, even though declaring to offer screening services to evaluate the resilience of a paying out customer’s web infrastructure, are thought to have targeted various victims in the U.S. and elsewhere, these kinds of as educational establishments, governing administration organizations, and gaming platforms.

The DoJ observed that millions of persons have been attacked making use of the DDoS-for-hire platforms. In accordance to court paperwork, more than one million registered consumers of IPStresser[.]com executed or tried to carry out extra than 30 million DDoS attacks amongst 2014 and 2022.

An assessment of communications involving the booter site administrators and their prospects undertaken by the U.S. Federal Bureau of Investigation (FBI) shows that the expert services are attained as a result of a cryptocurrency payment.

“Proven booter and stresser expert services supply a effortless implies for malicious actors to carry out DDoS attacks by permitting this sort of actors to pay for an current network of infected equipment, fairly than making their individual,” the FBI claimed. “Booter and stresser expert services might also obscure attribution of DDoS action.”

The enhancement comes 4 decades after the DoJ and FBI took equivalent actions in December 2018 to seize 15 domains that marketed personal computer attack platforms like Critical-boot[.]com, RageBooter[.]com, downthem[.]org, quantumstress[.]net, Booter[.]ninja, and Vbooter[.]org.

The area takedowns are section of an ongoing coordinated law enforcement exertion codenamed Procedure PowerOFF in collaboration with the U.K., the Netherlands, and Europol aimed at dismantling prison DDoS-for-hire infrastructures all over the world.

Identified this report interesting? Abide by us on Twitter  and LinkedIn to read through additional exclusive articles we put up.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «hacking using svg files to smuggle qbot malware onto windows Hacking Using SVG Files to Smuggle QBot Malware onto Windows Systems
Next Post: Hackers Bombard Open Source Repositories with Over 144,000 Malicious Packages hackers bombard open source repositories with over 144,000 malicious packages»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL

Copyright © TheCyberSecurity.News, All Rights Reserved.